redtimmy / golden-friezaView external linksLinks
ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory
☆26Feb 29, 2020Updated 5 years ago
Alternatives and similar repositories for golden-frieza
Users that are interested in golden-frieza are comparing it to the libraries listed below
Sorting:
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- ☆22May 29, 2020Updated 5 years ago
- Windows DLL injection using rust.☆20Jul 20, 2016Updated 9 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Good-enough Hex Editor/Annotator☆24May 3, 2020Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Code snippets from my blog☆29Oct 13, 2025Updated 4 months ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated 3 weeks ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- VirtualBox Disk Image Encryption password cracker☆32Oct 6, 2015Updated 10 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Feb 7, 2021Updated 5 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Resolve bulk host file list to IP addresses, ASN, and validate DNS.☆39Apr 25, 2025Updated 9 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()☆80Jul 20, 2020Updated 5 years ago
- 来自 gloxec 的 CrossC2 frameworkfork 备份 2.0版本☆34Sep 27, 2020Updated 5 years ago
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- simple and clean ip look up with bootstrap template☆131Sep 30, 2020Updated 5 years ago
- ☆17Updated this week
- Embedded async HTTP 1.1 server based on a source code from https://github.com/splunk/pion☆13Jan 20, 2021Updated 5 years ago
- Code for my collection of predictors/classifiers/etc☆14Jul 18, 2024Updated last year
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆92Aug 19, 2024Updated last year
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago